arxiv: v1 [cs.ni] 4 Aug 2013
|
|
- Kelley Ward
- 8 years ago
- Views:
Transcription
1 MonoStream: A Minimal-Hardware High Accuracy Device-free WLAN Localization System arxiv:8.768v [cs.ni] 4 Aug ABSTRACT Ibrahim Sabek Comp. and Sys. Eng. Dept. Alexandria University, Egypt ibrahim.sabek@alexu.edu.eg Device-free (DF) localization is an emerging technology that allows the detection and tracking of entities that do not carry any devices not participate actively in the localization process. Typically, DF systems require a large number of transmitters and receivers to achieve acceptable accuracy, which is not available in many scenarios such as homes and small businesses. In this paper, we introduce MonoStream as an accurate single-stream DF localization system that leverages the rich Channel State Information (CSI) as well as MIMO information from the physical layer to provide accurate DF localization with only one stream. To boost its accuracy and attain low computational requirements, MonoStream models the DF localization problem as an object recognition problem and uses a novel set of CSI-context features and techniques with proven accuracy and efficiency. Experimental evaluation in two typical testbeds, with a side-by-side comparison with the state-of-the-art, shows that MonoStream can achieve an accuracy of.9m with at least 6% enhancement in median distance error using a single stream only. This enhancement in accuracy comes with an efficient execution of less than ms per location update on a typical laptop. This highlights the potential of MonoStream usage for real-time DF tracking applications. Categories and Subject Descriptors C..4 [Computer-Communication Networks]: Distributed Systems; H..4 [Information Storage and Retrieval]: Systems and Software General Terms Algorithms, Experimentation, Measurement, Performance, Security Keywords Device-free localization, detection and tracking, physicallayer based localization. Moustafa Youssef Wireless Research Center E-JUST, Egypt moustafa.youssef@ejust.edu.eg Access Point (AP) Line-of-sight Monitoring Point (MP) Reflected or Diffracted Signal Figure : Typical architecture of a DF WLAN localization system.. INTRODUCTION Many localization systems have been proposed over the years including the GPS system [4], RF-based systems [, 7], and infrared-based systems []. All these systems require that the tracked entity carries a device. On the other hand, device-free (DF) passive localization [6] is based on using typical wireless networks to detect and track entities that do not carry any devices nor participate actively in the localization process. It depends on the fact that the RF signal strength is affected by human motion. DF localization can be used in many applications including smart homes, intrusion detection, medical care, and traffic estimation. A typical DF system (Figure ) consists of signal transmitters (such as standard access points (APs)), monitoring points (MPs) (such as standard laptops or APs themselves), and an application server for processing the received signal strength from the MPs to detect and localize events. Current approaches for DF localization include radarbased systems, e.g. [,, 6], computer vision based systems, e.g. [, 9] and Radio Tomographic Imaging (RTI), e.g. []. These systems, however, need special hardware and high installation cost. On the contrary, a
2 number of DF localization systems have been proposed that operate in standard WiFi networks, e.g. Nuzzer [6] and Rasid [8], without requiring any additional equipment. Therefore, these systems provide a value added-service on top of the wireless infrastructure, just based on the reported signal strength from the MAC layer. While these systems provide lower cost localization services, they still require a large number of streams (a data stream is the data received from one AP at one MP), which limits their applicability and accuracy in a large class of scenarios, such as in homes and small bussinesses, where usually a small number, typically one AP is installed. In this paper, we introduce MonoStream as a highaccuracy limited-hardware device-free WLAN localization system. MonoStream is designed to work with a low number of streams, typically one (i.e. one AP and one MP). To compensate for the loss of information due to reducing the number of streams, MonoStream leverages the detailed physical layer information of WiFi networks. In particular, the IEEE 8.n standard uses the OFDM modulation, where a wide channel is divided into several orthogonal sub-carriers each arriving at the location of the receiver with distinct values of phase and magnitude (denoted as Channel State Information (CSI)). This provides rich information to detect the effect of human motion on the magnitude of each subcarrier, as compared to a single signal strength value that has been used with the current approaches. In addition, the IEEE 8.n devices use the MIMO technology, which further provides more information about each antenna pair from the transmitter to the receiver. To further address the noisy wireless channel and the rich CSI information, MonoStream models the DF localization problem as an object recognition problem, where it treats the CSI profile at different locations as images and extracts novel features that can capture small variations in the effect of the human standing at different locations in the area of interest on the CSI vectors. To reduce the computational cost of the proposed techniques on the application server, MonoStream employs a joint boosting technique [9] to scale up for a large number of features and locations. Experimental evaluation, in two typical testbeds using a single access point and a single laptop, shows that MonoStream can achieve a localization accuracy of less than.9m. This corresponds to at least 6% enhancement in median distance error over the state-of-the-art DF localization systems using the same environment. This comes with a realtime location update rate that requires less than ms per location estimate. The rest of the paper is organized as follows: Section introduces a brief background about the physical layer information and its properties that can be used to identify the human location. Following that, Section presents the MonoStream system details. Section 4 describes the performance evaluation of the proposed system, comparing it to the state-of-the-art DF localization systems. Then, we present the related work in section, and discuss the other points related to the system in section 6. Finally, we conclude the paper and give directions for future work in section 7.. BACKGROUND AND CSI CHARACTER- IZATION In this section, we briefly present the OFDM modulation and MIMO technologies as well as the basic information we rely on to build the core system blocks.. Channel State Information (CSI) and MIMO Technology Many IEEE 8. standards (e.g. a/g/n) use OFDM modulation that transmits signals over several orthogonal frequencies called sub-carriers. Each signal transmitted on a sub-carrier has a different signal strength and phase. Typical wireless cards provide only a single received signal strength (RSS) value representing the superposition of information from all sub-carriers. Recently, some IEEE 8.n standard based cards available in the market provide detailed magnitude and phase information about the different sub-carriers represented as Channel State Information (CSI). In particular, the Intel card reports the CSI for groups of sub-carriers, which is about one group for every sub-carriers for the MHz channels operating on the.4ghz frequency [7]. The IEEE 8.n nodes also use another technology which is Multiple-Input Multiple-Output (MIMO) where there are multiple transmitter and receiver antennas. Each combination of receiver and transmitter antennas can be considered as a separate virtual link/stream. Therefore, MIMO technology provides multiple virtual streams between a transmitter-receiver pair and hence has the potential of providing better accuracy.. CSI Observations In this section, we show some of our observations on the CSI that we base the system components on. For space constraints, we focus on the magnitude of the received signal strength (RSS) in this paper and leave the phase information to a future paper. Figure shows the (profile) for one virtual link, i.e. a transmitter antenna-receiver antenna pair, over different packets (each packet is represented by a line) for the sub-carriers. We can notice from the figure that the CSI values for each stream form one or more clusters. Figure shows the CSI profile for the silence case
3 (a) Silence (no human) (b) Human at Location (c) Human at Location Figure : s for different cases. 6 4 (a) Link with one cluster. 4 (b) Link with two clusters. Figure : CSI profile for different virtual links (a link is one transmitter-receiver antennas pair). Each line represents the of one packet over all subcarriers. Different lines represent different packets. 4 (f) Figure 4: CSI information for two adjacent locations (separated by m) overlapped on the same figure. as well as the presence of the human at two separated locations for one virtual link. The figure shows that the information can be used to identify the human presence as well as determine her location. Figure 4 shows the CSI profile for two adjacent locations (separated by meter) for one virtual link. The figure shows that there is still some difference in the CSI magnitude information between the two locations. Although the RSS distribution of each sub-carrier of each cluster at each location can be modelled by a Gaussian mixture [, ], the large overlap between the CSI profiles and the smoothness effect introduced by the Gaussian mixture leads to aliasing between adjacent locations, which reduces accuracy. Instead, MonoStream takes a novel approach of treating the CSI profile of a given link at a given location (e.g. figures a or b) as an image and employs object recognition techniques with proven accuracy and efficiency to capture the small variations in the profile between adjacent locations.. THE MONOSTREAM SYSTEM In this section, we give the details of MonoStream. We start by an overview of the system architecture followed by the system model, features construction, and system details.. Overview Figure shows the system architecture. We have two phases of operation: offline and online. During the offline phase, a person stands at different locations in the area of interest. For each location, CSI values are recorded for all transmitter-receiver pairs (i.e. virtual links) and used to extract features and to train a set of classifiers. During the online phase, the system uses the collected CSI information to estimate the persons unknown location. The system is implemented through a set of modules: The CSI Preprocesser extracts s from sent packets for each virtual link and filters outlier values. The CSI-context Filters Builder constructs the filters (during the offline phase) used by the Features Extraction Module to extract the features from the CSI information. These features are used by the Joint Booster Classifier Trainer during the offline phase to efficiently train a set of binary classifiers, one for each location in the area of interest. The trained classifiers are used during the online phase to provide a list of active locations with positive human detection along with the associated confidence. Finally, the Location Estimator fuses the output of the different classifiers to estimate the entity location both in the discrete and continuous space.
4 Transmitter antenna (n) MonoStream CSI Preprocesser CSI Extractor CSI Filter CSI-context Filters Builder Features Extraction Module CSI feature vectors Location Estimator f f f.. fn CSI-context filters Joint Boosting Classifiers Trainer Discrete-Space Estimator Continuous-Space Estimator Candidate locs + confidence Joint Boosting Classifiers S Classifiers parameters Estimated Location Figure : MonoStream system architecture. Shaded blocks represent modules that run in the offline phase. Signal amplitude s Receiver antenna (m) 6 4 Figure 6: Matrix representing CSI information (fingerprint data) at a particular location from all virtual links over all carriers. The matrix indices represent the transmitter and receiver antennas while the content represents the CSI profile.. System Model Assume an area of interest divided into L fingerprint, i.e. training, locations. This area is covered by only one AP with n MIMO antennas and one MP (e.g. a laptop) with a wireless card having m MIMO antennas. This leads to n.m virtual links between the transmitter and receiver. Using the OFDM modulation, each transmitted packet is sent using f sub-carriers on each of the n antennas. This leads to a total of n.m.f virtual streams between each physical transmitter-receiver pair, as compared to only only stream with the traditional RSS-based techniques [6, 7]. Figure 7: Context-filter examples: each filter is represented by a rectangle of random size over the CSI profile of a single virtual link (transmitter-receiver pair). During the training phase, a human stands at each location l L and the CSI of a set of packets sent by the AP are recorded at the MP. The CSI information of all packets corresponding to location l is represented by a matrix (Figure 6) of size n.m, whose entry (i, j) represents the CSI profile (as in Figure ) of the virtual link representing the packets from transmitter antenna i to receiver antenna j. This rich information is what allows MonsStream to achieve high accuracy with just a single AP-MP pair.. Features and Context Filters This section discusses our proposed CSI-based features that will be used to train the discrimination model 4
5 used to differentiate between different locations. To capture small variations in the CSI profiles between adjacent locations, MonStream borrows techniques from the object recognition domain [, 8], where the CSI profile of a particular virtual link at a certain location is treated as an image. Random sampling of features within these CSI-profile images is used to reduce complexity as well as increase the discrimination between adjacent locations. In particular, we define a context filter on a CSI profile as a rectangular mask whose width is determined by the range of sub-carriers covered; and height determined by the range of values covered (Figure 7). For example, we can define a context filter that covers sub-carriers from to, and CSI magnitudes from to. A set of d context filters T = {t i }; i =,..., d is then defined by selecting rectangles with different random sizes (width and hight uniformly distributed over the range) over the CSI profiles in the matrix. These random filters, once selected, are then fixed over the different locations. Let λ t be the number of packets that fall inside a CSI-context filter t T. Instead of using λ t s directly, MonoStream uses Haar-like [] features to increase the feature space and hence lead to better accuracy. Specifically, for two different CSI-context filters t i, t j T, the associated feature λ i,j is obtained as λ i λ j. Note that there are ( d ) different combinations of features to choose from, each representing a pair of filter indices (i, j). The choice of d represents a trade-off between accuracy and efficiency as quantified in the Evaluation Section. This feature space is further reduced by selecting the best features during the classifier training phase..4 Classifier Training Module Once the features are extracted, the goal of the Classifier Training Module is to train a binary classifier for each location to differentiate it from all other fingerprint locations based on the training data. To balance computational efficiency and accuracy, we adopt an AdaBoost-based classifier [,, 9]. AdaBoost is an iterative technique that adds a new simple weak classifier in each iteration. At each round, samples that are misclassified from previous rounds are assigned higher weights so that the current weak classifier focuses on disambiguating them. A weight is assigned to each classifier and the final classifier is defined as the linear combination of the classifiers from each iteration. AdaBoost can be regarded as a feature selection technique that selects the most discriminant g features, where g is the number of iterations. Therefore, this further reduces the number of features, and hence is more computa- The key advantage of a Haar-like feature over other features is its calculation speed. tionally efficient. We adopt decision stumps as our weak binary classifiers. A decision stump is defined by three parameters: a feature that it classifies, a threshold on the feature value, and the sign of the decision (whether it takes a positive or negative value if the feature value is above the threshold). Therefore, implementing our weak classifier requires just one condition check, which is extremely efficient. Furthermore, instead of independently training the classifier of each location, we use a joint boosting approach that selects the best features that can be used to discriminate between the largest subset of locations [9] in each iteration. For a given performance level, joint boosting reduces the training overhead to logarithmic in the number of locations (as features are shared between locations), increases accuracy, reduces running time, and avoids over-fitting of the training samples. This last property is of specific importance in DF localization due to the noisy and dynamic nature of the wireless channel.. Location Estimator The purpose of this module is to estimate the actual user location given a received CSI vector/profile S. We start by assuming that the user is standing at one of the discrete fingerprint locations then we generalize this to an arbitrary location in the next subsection... Discrete-space estimator The extracted features from the CSI vector are processed by the Joint Boosting Classifiers to generate the binary decision for each location and its associated confidence. For a classifier for fingerprint location l L, let d l be if the classifier detects that a person is present at this location and - otherwise. In addition, let c l the decision confidence of that classifier. In order to fuse the output of the different classifiers, we adopt a probabilistic approach where we want to find the location l in the fingerprint L that maximizes the probability P (l S). That is: l = arg max P (l S) () l Using Baysian inversion, this can be represented as: l = arg max l P (S l).p (l) P (S) () Assuming all locations are equally likely and noting that P (S) is independent of l, Equation becomes: l = arg max P (S l) () l If the probabilities distribution of P (l) is known, it can be used directly in Equation
6 We estimate P (S l) as a function of the classifiers confidence for the location with positive detection as: c l P (S l) = (4) c i i; d i= To further enhance the accuracy, MonoStream calculates the probability based on a sequence of packets during a time window w..6 Continuous-space estimator The previous estimator will always return one of the fingerprint locations, even if the entity is standing in a location that does not coincide with any of the fingerprint locations. To further enhance accuracy, the continuous space estimator uses a spatial averaging technique. The spatial averaging technique estimates the location as the weighted average of the most probable k locations, where each location is weighed by its probability (Equation 4) normalized by the sum over all probabilities. Note that using the continuous-space estimator, MonoStream can achieve accuracy that is better than the fingerprint grid spacing. 4. PERFORMANCE EVALUATION In this section, we analyze the performance of MonoStream and compare it to the state-of-the-art DF WLAN localization systems [7, 6, ]. We start by describing the experimental setup and data collection. Then, we analyze the effect of different parameters on the system performance. We end the section by a comparison with the state-of-the-art. 4. Testbeds and Data Collection We conducted two experiments with different testbeds (Figure 8). The first testbed covers a typical apartment with an area of approximately m (about 77 sq. ft.) while the second testbed represents a residential apartment with an area of 4m (about 8 sq. ft.). Both testbeds are with typical furniture. The area was covered by a single Cisco Linksys X AP and a Dell Adamo XPS laptop as a MP. The laptop has an Intel card that can provide CSI information [7]. The fingerprint is constructed for () different locations for the first (second) testbed, uniformly distributed over the testbed area. An independent test set of 7 locations are chosen randomly between the training locations at different times of day using different persons from the training set. Table shows the default values for the different parameters. For the running time estimation, all experiments were performed on a Dell Latitude E6 with an Intel Core i7 CPU running at.67 GHz and having 8GB RAM. Due to space constraints, we give the details of the first testbed and summarize the results of the second. (a) Testbed. (b) Testbed. Figure 8: Testbeds for the experiment with training locations marked as red crosses and testing locations marked as green circles. Parameter Default Meaning value m Num. of receiver antennas f Num. of sub-carriers g 7 Num. of boosting rounds w Num. of packets per loc. est. k 6 Spatial avg. window Table : Default parameters values. 4. Effect of Different Parameters 4.. Effect of the number of receiver antennas (m) Figure 9 shows the effect of changing the antennas combinations on the median distance error. The figure shows that different combinations lead to different accuracy. This is due to the noisy wireless channel and the different multipath effects encountered by the packets received at the different antennas. This means that using more antennas does not necessarily lead to better accuracy. The good news is that the SNR associated with the antennas can be used to determine the best combination. For the rest of this section, we use an- 6
7 Median distance error (m) a b c a-b-c a-c b-c a-b Combination of antennas Median distance error (m)... Number of sub-carriers (f) Figure 9: Effect of different combinations of receiver antennas (a, b, c). Median distance error (m)... 4 Number of packets (w) Figure : Effect of the number of packets used in one location estimate (w). tennas a and c (i.e. m = ) as they lead to the best accuracy. 4.. Effect of number of packets used in estimation (w) Figure shows the effect of increasing the number of packets used in the estimation process. The figure shows that as the number of packets increases, the accuracy increases. However, increasing w increases the latency. Therefore, there is a tradeoff that a designer needs to balance based on her needs. Setting w = gives high accuracy of.9m with reasonable latency. 4.. Effect of processed sub-carriers (f) Figure shows the effect of increasing the number of sub-carriers on the median distance error. For a specific number of sub-carriers (f), we choose a number of random subsets of size f from the available sub- Figure : Effect of the number of sub-carriers used. Error bars represent the standard deviation over different randomly selected sets of sub-carriers. Median distance error (m) Number of averaged locations (k) Figure : Effect of the number of averaged locations (k). carriers and draw both the average and standard deviation of performance. The figure shows that, in general, increasing the number of sub-carriers leads to better accuracy. This due to the increased amount of available information. Therefore, a designer can tune the the accuracy-computational complexity if needed Effect of number of averaged locations (k) Figure shows the effect of increasing the number of averaged locations (k) for the continuous-space estimator. The figure shows that increasing the number of averaged locations reduces the median distance error until it saturates around k =. 4.. Effect of number of CSI-context filters (d) Figure shows the effect of increasing the number CSI-context filters. The figure shows that increasing 7
8 Median distance error (m) Number of CSI-context filters (d) Figure : Effect of the number of CSI-context filters (d). Error bars represent the standard deviation over different random selection of filters. the number of CSI-context filters reduces the median distance error. We pick d = as it balances accuracy and computational overhead Effect of number of boosting rounds (g) Figures 4a and 4b show the effect of the number of boosting rounds on the training time and online phase performance respectively. The figure shows that the training and estimation time increases linearly with the boosting rounds. Simultaneously, the accuracy increases with the increase of the boosting rounds until it saturates at R = 7. Therefore, we take this value as the default value. 4. Comparison with the State-of-the-Art Figure a compares the CDF of distance error for the MonoStream system to the Deterministic [7] and Probabilistic Nuzzer [6] traditional DF systems 4 designed for multiple streams as well as the MonoPhy system [] designed for a single stream based on a Gaussian mixtures approach. Table summarizes the results. The results show that MonoStream has the best accuracy with an enhancement of at least 6.% in median distance error over the best state-of-the-art technique in a single stream environment. Figure b shows the running time of the different technique. The figure shows that the accuracy advantage of MonoStream does not compromise efficiency; Only ms are required per location update, which shows that MonoStream can run in realtime. 4 These techniques do not use the CSI information but rather the combined RSS only as reported by the MAC layer. Avg train. time / FP loc. (sec) Median distance error (m) Number of boosting rounds (g) (a) Offline training phase. Accuracy Running time Number of boosting rounds (g) (b) Online phase. Avg. running time/ loc. est. (ms) Figure 4: Effect of the number of boosting rounds on performance.. RELATED WORK Device-free tracking schemes have advanced over the year including: radar-based, camera-based, sensors-based, and WLAN-based systems. In the radar-based systems, pulses of radio waves are transmitted into the area of interest and based on measuring the received reflections, objects could be tracked. Several approaches have been presented in this class including ultra-wideband (UWB) systems [], doppler radar [], and MIMO radar systems [6]. On the other hand, camera-based tracking systems are based on analyzing a set of captured images to estimate the current locations of objects of interest [, 9]. Sensor-based systems use especially installed sensor nodes to cover the area of interest. For example, [] applies radio tomographic techniques to the readings of a dense array of sensors to obtain accurate DF tracking. All these technologies share the requirement of in- 8
9 Table : Performance summary for the different systems under the two testbeds using median distance error and running time as the metric. Numbers between parenthesis represent the percentage difference from MonoStream. System Testbed Testbed Median Running Median Running error time error time MonoStream.9m.64ms.4m 6.8ms MonoPHY [].6m (%).6ms (76.%).9m (6.%) 4.44ms (7.7%) Prob. Nuzzer [6].6m 4.6ms.m.47ms (6.87%) Det. Nuzzer [7].6m (69.9%) (8.98%).4ms (9.94%) (4.8%).9m (64.%) (78.68%).67ms (89.74%) Cum. Dist. Fun. (CDF) Avg. run. time /loc. estimate (ms) MonoStream MonoPHY [] Prob. Nuzzer [6] Determ. Nuzzer [7] Distance error (m) (a) CDF of distance error. Features extraction Classification Location estimation Total time MonoStream MonoPHY (b) Running time. Prob. Nuzzer Det. Nuzzer Figure : Comparison with the state-of-the-art techniques. stalling special hardware to be able to perform DF tracking, which reduces their scalability in terms of cost and coverage area. In contrast, WLAN DF tracking aims at exploiting the already installed WLAN. DF localization in WLANs was first introduced in [6] along with feasibility experiments in a controlled environment. Several papers followed the initial vision to provide different techniques for detection and tracking of a single entity [4, 4, 8, 7]. Tracking multiple entities was proposed in SPOT [] based on a probabilistic energy minimization framework that combines a conditional random field with a Markov model to capture both of spatial and temporal relations between active locations. All these techniques rely only on the reported signal strength from the MAC layer and hence require a large number of streams, i.e. APs and MPs, to provide acceptable accuracy. The closest work to ours is the MonoPhy system [] that models the CSI information using a Gaussian mixtures approach. However, since the CSI profiles in adjacent locations are usually similar, the smoothness effect of the Gaussian mixture leads to aliasing in the CSI space between adjacent locations, which reduces accuracy. The novel approach adopted from the object recognition domain allows the MonoStream system to capture the small variations in RSS between adjacent locations and maintain high efficiency. 6. DISCUSSION 6. Accuracy MonoStream accuracy is based on three factors: () leveraging the rich CSI information, () sampling a large number of features that capture small variations between adjacent locations, and () using a joint boosting technique that selects the combined best features over all locations and avoids over training. These factors allow it to tolerate a low number of streams and achieve high accuracy. 6. Efficiency The increase in accuracy of MonoStream does not come at an increased complexity. MonoStream employs a number of techniques to enhance its efficiency and trade the accuracy with efficiency as quantified in the evaluation section. These include: () using easy-tocompute Haar-like features, () using decision stumps 9
10 that can be computed using only a single comparison check, and () adopting an joint boosting approach that selects the best features, reduces training overhead and reduces the feature space. This in turn reflects in reducing the running time of the algorithm. Theoretically, the training complexity of the joint boosting classifier is O(g. L ) [9] whereas the location estimation complexity is O(g. L ). 6. Multi-entity Tracking Although all results in the paper focus on a single entity, the extension to the multiple entities case is straight forward. Current approaches for multi-entity DF localization, e.g. [], can be applied directly to the MonoStream system. 6.4 Dynamic Changes in the Environment Another important aspect of the practical deployment of MonoStream is handling the dynamic changes in the environment which may require re-calibration of the area of interest. Different approaches can be applied to capture these dynamic changes including dynamically updating the stored parameters, e.g. using anomaly detection techniques as in [8], and using CAD tools for DF systems, e.g. as in []. 7. CONCLUSION We tackled the device-free passive localization problem using physical layer information supported by WLAN standards. We presented the MonoStream system based on a novel set of CSI-context features that can capture minimal variations in the CSI profiles between adjacent locations. Combined with an efficient AdaBoosting classifier, this allows us to achieve both accurate and efficient DF localization using only a single transmitter and receiver. Experimental evaluation in two typical WiFi testbeds shows that MonoStream can achieve.9m median distance error, which is better than the state-of-the-art techniques by at least 6%. This enhancement in accuracy comes with an efficient execution of less than ms per location update on a typical laptop. This highlights the promise of MonoStream for real-time DF tracking applications. Currently, we are expanding MonoStream in multiple directions including integrating the CSI phase information, multiple entities tracking, and entity identification. 8. REFERENCES [] H. Abdel-Nasser, R. Samir, I. Sabek, and M. Youssef. MonoPHY: Mono-Stream-based Device-free WLAN Localization via Physical Layer Information. In IEEE Wireless Communications And Networking Conference, WCNC,. [] P. Bahl and V. N. Padmanabhan. RADAR: An In-Building RF-based User Location and Tracking System. In IEEE Infocom, pages ,. [] A. Eleryan, M. Elsabagh, and M. Youssef. Synthetic generation of radio maps for device-free passive localization. In GLOBECOM,. [4] P. Enge and P. Misra. Special Issue on Global Positioning System. In Proceedings of the IEEE, January 999, pages 7, 999. [] Y. Freund and R. E. Schapire. A decision-theoretic generalization of on-line learning and an application to boosting. In Proceedings of the Second European Conference on Computational Learning Theory, EuroCOLT 9, pages 7. Springer-Verlag, 99. [6] A. M. Haimovich, R. S. Blum, and L. J. Cimini. MIMO Radar with Widely Separated Antennas. IEEE Signal Processing Magazine, pages 6 9, 8. [7] D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Tool Release: Gathering 8.n Traces with Channel State Information. ACM SIGCOMM CCR, 4():, Jan.. [8] A. E. Kosba, A. Saeed, and M. Youssef. RASID: A Robust WLAN Device-free Passive Motion Detection System. In PerCom, pages 8 89,. [9] J. Krumm, S. Harris, B. Meyers, B. Brumitt, M. Hale, and S. Shafer. Multi-Camera Multi-Person Tracking for Easyliving. In Third IEEE International Workshop on Visual Surveillance,. [] T. Leung and J. Malik. Representing and Recognizing the Visual Appearance of Materials using Three-dimensional Textons. Int. J. Comput. Vision, 4():9 44, June. [] A. Lin and H. Ling. Doppler and direction-of-arrival (DDOA) radar for multiple-mover sensing. IEEE Trans. Aerosp. Electron. Syst., 4(4):496 9, 7. [] S. Mahamud, M. Hebert, and J. Shi. Object Recognition using Boosted Discriminants. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ), with CD-ROM, 8-4 December, Kauai, HI, USA, page. IEEE Computer Society,. [] T. B. Moeslund, A. Hilton, and V. Krger. A survey of advances in vision-based human motion capture and analysis. Computer Vision and Image Understanding, 4(-):9 6, 6. [4] M. Moussa and M. Youssef. Smart Devices for Smart Environments: Device-free Passive
11 Detection in Real Environments. In IEEE PerCom Workshops, 9. [] I. Sabek and M. Youssef. Multi-entity Device-Free WLAN Localization. In IEEE Global Communications Conference, GlobeCom,. [6] M. Seifeldin, A. Saeed, A. E. Kosba, A. El-Keyi, and M. Youssef. Nuzzer: A large-scale device-free passive localization system for wireless environments. IEEE Transactions on Mobile Computing,. [7] M. Seifeldin and M. Youssef. A Deterministic Large-scale Device-free Passive Localization System for Wireless Environments. In PETRA : Proceedings of the rd International Conference on Pervasive Technologies Related to Assistive Environments, pages 8,. [8] J. Shotton, J. M. Winn, C. Rother, and A. Criminisi. TextonBoost: Joint Appearance, Shape and Context Modeling for Multi-class Object Recognition and Segmentation. In ECCV (), pages, 6. [9] A. Torralba, K. P. Murphy, and W. T. Freeman. Sharing features: efficient boosting procedures for multiclass object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, volume, pages , Washington, DC, June 4. [] D. Tse and P. Viswanath. Fundamentals of wireless communication. Cambridge University Press, New York, NY, USA,. [] P. A. Viola and M. J. Jones. Rapid Object Detection using a Boosted Cascade of Simple Features. In CVPR (), pages 8,. [] R. Want, A. Hopper, V. Falcao, and J. Gibbons. The Active Badge Location System. In ACM Transactions on Information Systems, pages 9, 99. [] J. Wilson and N. Patwari. Radio Tomographic Imaging with Wireless Networks. In tech. rep. University of Utah, 8. [4] J. Yang, Y. Ge, H. Xiong, Y. Chen, and H. Liu. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments. In The 9th Conference on Computer Communications, INFOCOM, pages 9,. [] Y. Yang and A. E. Fathy. See-through-wall imaging using ultra-wideband short-pulse radar system. In IEEE Antennas Propag. Soc. Int. Symp,. [6] M. Youssef, M. Mah, and A. Agrawala. Challenges: Device-Free Passive Localization for Wireless Environments. In MobiCom 7: Proceedings of the th annual ACM international conference on Mobile computing and networking, pages 9. New York, NY, USA, 7. [7] M. A. Youssef and A. Agrawala. The Horus WLAN Location Determination System. In ACM MobiSys, pages 8,.
Analysis of a Device-free Passive Tracking System in Typical Wireless Environments
Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Ahmed E. Kosba, Ahmed Abdelkader Department of Computer Engineering Faculty of Engineering, Alexandria University, Egypt
More informationNew Insights into WiFi-based Device-free Localization
New Insights into WiFi-based Device-free Localization Heba Aly Dept. of Computer and Systems Engineering Alexandria University, Egypt heba.aly@alexu.edu.eg Moustafa Youssef Wireless Research Center Egypt-Japan
More informationInt. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2404-2408 (2015) ISSN: 0975-0290
2404 Nuzzer algorithm based Human Tracking and Security System for Device-Free Passive System in Smart Phones Environment R.Ranjani Assistant Professor, Department of Computer Science and Engineering,
More informationChallenges: Device-free Passive Localization for Wireless Environments
Challenges: Device-free Passive Localization for Wireless Environments Moustafa Youssef Dept. of Computer Science University of Maryland College Park, MD 2742, USA moustafa@cs.umd.edu Matthew Mah Dept.
More informationDevice-Free Passive Localization
Device-Free Passive Localization Matthew Mah Abstract This report describes a Device-Free Passive Localization System (DfP). The system provides a software solution over nominal WiFi equipment to detect
More informationYour AP Knows How You Move: Fine-grained Device Motion Recognition through WiFi
Your AP Knows How You Move: Fine-grained Device Motion Recognition through WiFi Yunze Zeng, Parth H. Pathak, Chao Xu, Prasant Mohapatra Computer Science Department, University of California, Davis, CA,
More informationMotion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements
Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,
More informationSession: CoSDEO 2013: Device-free Radio-based Recognition
CoSDEO 2013: Device-free Radio-based recognition Markus Scholz Karlsruhe Institute of Technology Vincent Priessnitz Strasse 3 Karlsruhe, Germany scholz@teco.edu Stephan Sigg TU Braunschweig Muehlenpfordtstrae
More informationDetecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,
More informationIndoor Robot Localization System Using WiFi Signal Measure and Minimizing Calibration Effort
IEEE ISIE 2005, June 20-23, 2005, Dubrovnik, Croatia Indoor Robot Localization System Using WiFi Signal Measure and Minimizing Calibration Effort M. Ocaña*, L. M. Bergasa*, M.A. Sotelo*, J. Nuevo*, R.
More informationInternational Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612
Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,
More informationVoice services over Adaptive Multi-user Orthogonal Sub channels An Insight
TEC Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight HP 4/15/2013 A powerful software upgrade leverages quaternary modulation and MIMO techniques to improve network efficiency
More informationAdvanced Ensemble Strategies for Polynomial Models
Advanced Ensemble Strategies for Polynomial Models Pavel Kordík 1, Jan Černý 2 1 Dept. of Computer Science, Faculty of Information Technology, Czech Technical University in Prague, 2 Dept. of Computer
More informationHyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength
Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength Mikkel Baun Kjærgaard and Carsten Valdemar Munk University of Aarhus, Department of Computer
More informationMultiuser Communications in Wireless Networks
Multiuser Communications in Wireless Networks Instructor Antti Tölli Centre for Wireless Communications (CWC), University of Oulu Contact e-mail: antti.tolli@ee.oulu.fi, tel. +358445000180 Course period
More informationWhitepaper. 802.11n The Next Generation in Wireless Technology
Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed
More informationTagoram: Real-Time Tracking of Mobile RFID Tags to High-Precision Accuracy Using COTS Devices
Tagoram: Real-Time Tracking of Mobile RFID Tags to High-Precision Accuracy Using COTS Devices Xiang-Yang Li Lei Yang, Yekui Chen, Xiang-Yang Li, Chaowei Xiao, Mo Li, Yunhao Liu Sep. 9, 2014 Tagoram: Real-Time
More informationDelivering broadband internet access for high speed trains passengers using the new WiFi. standard 802.11n for train-to-ground communications
Delivering broadband internet access for high speed trains passengers using the new WiFi standard 802.11n for train-to-ground communications Hassan GHANNOUM 1, David SANZ 1, Bernadette VILLEFORCEIX 2,
More informationAn Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationTop Six Considerations
Top Six Considerations for Upgrading to table of contents + Section I: Introduction Understanding...2 + Section II: Uses Cases for... 3 + Section III: Top 6 considerations for...5 + Section IV: Conclusion...
More informationConcept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
More informationI. Wireless Channel Modeling
I. Wireless Channel Modeling April 29, 2008 Qinghai Yang School of Telecom. Engineering qhyang@xidian.edu.cn Qinghai Yang Wireless Communication Series 1 Contents Free space signal propagation Pass-Loss
More informationRaitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert
Tampere University of Technology Author(s) Title Citation Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert Positioning with multilevel coverage area models Raitoharju, Matti; Dashti,
More informationA Microscopic Look at WiFi Fingerprinting for Indoor Mobile Phone Localization in Diverse Environments
23 International Conference on Indoor Positioning and Indoor Navigation, 28-3 st October 23 A Microscopic Look at WiFi Fingerprinting for Indoor Mobile Phone Localization in Diverse Environments Arsham
More informationDistributed forests for MapReduce-based machine learning
Distributed forests for MapReduce-based machine learning Ryoji Wakayama, Ryuei Murata, Akisato Kimura, Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi Chubu University, Japan. NTT Communication
More informationPhysical Layer Research Trends for 5G
Physical Layer Research Trends for 5G Brett T. Walkenhorst, Ph.D. Principal Research Engineer, Georgia Tech Research Institute Adjunct Professor, Georgia Tech, School of Electrical and Computer Engineering
More informationAS MORE WIRELESS and sensor networks are deployed,
2418 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE 2010 Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks Yingying Chen, Member, IEEE, Jie Yang, Student
More informationA Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method
More informationPlanning for 802.11ac Adoption with Ekahau Site Survey 6.0
Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 1 P a g e w w w. e k a h a u. c o m / e s s Introduction to 802.11ac The emerging next generation Wi-Fi standard IEEE 802.11ac aims to break the
More informationMIMO Antenna Systems in WinProp
MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen mail@awe-communications.com Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011
More informationWiMax broadband wireless access. Wireless communication is considered one of the big engineering success stories
WiMax broadband wireless access Introduction Wireless communication is considered one of the big engineering success stories over the last two decades. It is one of the rapidly changing fields that demand
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationDetecting MAC Layer Misbehavior in Wi-Fi Networks by Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wi-Fi Networks by Co-ordinated Sampling of Network Monitoring G. Premkumar 1, C.V inoth 2, R. Srinivasan 3 Dept. of IT, PSV College of Engineering and Technology, Krishnagri,
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More informationEnable Location-based Services with a Tracking Framework
Enable Location-based Services with a Tracking Framework Mareike Kritzler University of Muenster, Institute for Geoinformatics, Weseler Str. 253, 48151 Münster, Germany kritzler@uni-muenster.de Abstract.
More informationPATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationEnsemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05
Ensemble Methods Knowledge Discovery and Data Mining 2 (VU) (707004) Roman Kern KTI, TU Graz 2015-03-05 Roman Kern (KTI, TU Graz) Ensemble Methods 2015-03-05 1 / 38 Outline 1 Introduction 2 Classification
More informationIndoor Positioning Systems WLAN Positioning
Praktikum Mobile und Verteilte Systeme Indoor Positioning Systems WLAN Positioning Prof. Dr. Claudia Linnhoff-Popien Michael Beck, André Ebert http://www.mobile.ifi.lmu.de Wintersemester 2015/16 WLAN Positioning
More informationADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
More informationIEEE 802.11ac in Service Provider Wi-Fi Deployments: Consider More Than Speed
White Paper IEEE 802.11ac in Service Provider Wi-Fi Deployments: Consider More Than Speed 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Contents
More informationA Performance Study of Wireless Broadband Access (WiMAX)
A Performance Study of Wireless Broadband Access (WiMAX) Maan A. S. Al-Adwany Department of Computer & Information Engineering, College of Electronics Engineering University of Mosul Mosul, Iraq maanaladwany@yahoo.com
More informationYou will need the following pieces of equipment to complete this experiment:
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING The Edward S. Rogers Sr. Department of Electrical and Computer Engineering ECE422H1S: RADIO AND MICROWAVE WIRELESS SYSTEMS EXPERIMENT 3:
More informationSEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
More informationEnhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System
Challenges in Building an Enterprise-scale WiFi Monitoring System Enhancing the Security of Corporate Wi-Fi Networks Using DAIR Scale of WLAN Microsoft s WLAN has over 5 APs Paramvir Bahl, Ranveer Chandra,
More informationData Mining Yelp Data - Predicting rating stars from review text
Data Mining Yelp Data - Predicting rating stars from review text Rakesh Chada Stony Brook University rchada@cs.stonybrook.edu Chetan Naik Stony Brook University cnaik@cs.stonybrook.edu ABSTRACT The majority
More informationWi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
More informationAnalyzing Shopper s Behavior through WiFi Signals
Analyzing Shopper s Behavior through WiFi Signals Yunze Zeng, Parth H. Pathak, Prasant Mohapatra University of California, Davis {zeng, phpathak, pmohapatra}@ucdavis.edu ABSTRACT Substantial progress in
More informationSECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS
SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationVOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
More informationContinuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information
Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering
More informationVEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James
More informationMean-Shift Tracking with Random Sampling
1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of
More informationLocal features and matching. Image classification & object localization
Overview Instance level search Local features and matching Efficient visual recognition Image classification & object localization Category recognition Image classification: assigning a class label to
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6
More informationMultihopping for OFDM based Wireless Networks
Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:
More informationMotorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions
Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,
More informationTCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS
TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationComparison of Distributed and Co-located Antenna Diversity Schemes for the Coverage Improvement of VoWLAN Systems
Comparison of Distributed and Co-located Antenna Diversity Schemes for the Coverage Improvement of VoWLAN Systems Azadeh Ettefagh 1, Marc Kuhn 1, Barry Cheetham 2, Armin Wittneben 1 1 Swiss Federal Institute
More informationCS231M Project Report - Automated Real-Time Face Tracking and Blending
CS231M Project Report - Automated Real-Time Face Tracking and Blending Steven Lee, slee2010@stanford.edu June 6, 2015 1 Introduction Summary statement: The goal of this project is to create an Android
More informationLoad Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
More informationALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS
ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS Date: 4/25/2013 Rev 1.0 Visit our Web Site at: www.allionusa.com 1 Introduction Internet Service Providers (ISP) have a number
More informationRF Coverage Validation and Prediction with GPS Technology
RF Coverage Validation and Prediction with GPS Technology By: Jin Yu Berkeley Varitronics Systems, Inc. 255 Liberty Street Metuchen, NJ 08840 It has taken many years for wireless engineers to tame wireless
More informationFrequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
More informationBringing Mobility-Awareness to WLANs using PHY Layer Information
Bringing Mobility-Awareness to WLANs using PHY Layer Information Li Sun University at Buffalo, SUNY lsun3@buffalo.edu Souvik Sen HP Labs souvik.sen@hp.com Dimitrios Koutsonikolas University at Buffalo,
More informationSmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
More informationAn Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
More informationForced Low latency Handoff in Mobile Cellular Data Networks
Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir
More informationHigh-fidelity electromagnetic modeling of large multi-scale naval structures
High-fidelity electromagnetic modeling of large multi-scale naval structures F. Vipiana, M. A. Francavilla, S. Arianos, and G. Vecchi (LACE), and Politecnico di Torino 1 Outline ISMB and Antenna/EMC Lab
More informationThe ArubaOS Spectrum Analyzer Module
Tech Brief Enterprise The ArubaOS Spectrum Analyzer Module The ArubaOS Spectrum Analyzer Module Tech Brief Table of Contents Introduction... 2 Visibility into the non-802.11 Spectrum... 2 Features... 3
More informationOn the Performance of Wireless Indoor Localization Using Received Signal Strength
Contents 12 On the Performance of Wireless Indoor Localization Using Received Signal Strength 1 12.1 Introduction................................... 1 12.2 RSS-based Localization Algorithms......................
More informationEstimation of Position and Orientation of Mobile Systems in a Wireless LAN
Proceedings of the 46th IEEE Conference on Decision and Control New Orleans, LA, USA, Dec. 12-14, 2007 Estimation of Position and Orientation of Mobile Systems in a Wireless LAN Christof Röhrig and Frank
More informationPositioning with Bluetooth
Positioning with Bluetooth Josef Hallberg, Marcus Nilsson, Kåre Synnes Luleå University of Technology / Centre for Distance-spanning Technology Department of Computer Science and Electrical Engineering
More informationADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform
More informationIntelligent Channel Bonding in 802.11n WLANs
Intelligent Channel Bonding in 82.n WLANs Lara Deek, Eduard Garcia-Villegas, Elizabeth Belding, Sung-Ju Lee, Kevin Almeroth UC Santa Barbara, UPC-BarcelonaTECH, Narus Inc. laradeek@cs.ucsb.edu, eduardg@entel.upc.edu,
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationREROUTING VOICE OVER IP CALLS BASED IN QOS
1 REROUTING VOICE OVER IP CALLS BASED IN QOS DESCRIPTION BACKGROUND OF THE INVENTION 1.- Field of the invention The present invention relates to telecommunications field. More specifically, in the contextaware
More informationWireless Data Center Network. Reporter: Green
Wireless Data Center Network Reporter: Green Outline What is DCN? Challenges in current DCN Cable Topology Traffic load Heterogeneous DCN Optical DCN Wireless DCN Challenges in WCDN The researches in WDCN
More informationSynthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS.
Guidelines for Student Reports Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS. A. Shariful Abstract The design of large arrays for radar applications require the
More informationAN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz
AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2
More informationUsing Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
More informationWi-Fi Backscatter: Internet Connectivity for RF-Powered Devices
Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, and David Wetherall University of Washington {kellogg, anparks, gshyam,
More informationApp coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
More informationMultipath fading in wireless sensor mote
Multipath fading in wireless sensor mote Vaishali M.Tech (VLSI), IMSEC, Ghaziabad/MTU, Noida Abstract: In this paper we study about the new technology as to transfer the data with the help of smart device,
More informationMVA ENS Cachan. Lecture 2: Logistic regression & intro to MIL Iasonas Kokkinos Iasonas.kokkinos@ecp.fr
Machine Learning for Computer Vision 1 MVA ENS Cachan Lecture 2: Logistic regression & intro to MIL Iasonas Kokkinos Iasonas.kokkinos@ecp.fr Department of Applied Mathematics Ecole Centrale Paris Galen
More informationMIMO detector algorithms and their implementations for LTE/LTE-A
GIGA seminar 11.01.2010 MIMO detector algorithms and their implementations for LTE/LTE-A Markus Myllylä and Johanna Ketonen 11.01.2010 2 Outline Introduction System model Detection in a MIMO-OFDM system
More informationMultisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu
More informationHow To Perform An Ensemble Analysis
Charu C. Aggarwal IBM T J Watson Research Center Yorktown, NY 10598 Outlier Ensembles Keynote, Outlier Detection and Description Workshop, 2013 Based on the ACM SIGKDD Explorations Position Paper: Outlier
More informationIntegration of GPS Traces with Road Map
Integration of GPS Traces with Road Map Lijuan Zhang Institute of Cartography and Geoinformatics Leibniz University of Hannover Hannover, Germany +49 511.762-19437 Lijuan.Zhang@ikg.uni-hannover.de Frank
More informationEnvironmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
More informationINTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2
ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena
More informationDigital Wall: A Power-efficient Solution for Location-based Data Sharing
Sixth Annual IEEE International Conference on Pervasive Computing and Communications Digital Wall: A Power-efficient Solution for Location-based Data Sharing Jeffrey Junfeng Pan, Sinno Jialin Pan, Vincent
More informationEnhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
More informationNeural Network Add-in
Neural Network Add-in Version 1.5 Software User s Guide Contents Overview... 2 Getting Started... 2 Working with Datasets... 2 Open a Dataset... 3 Save a Dataset... 3 Data Pre-processing... 3 Lagging...
More informationThe Visual Internet of Things System Based on Depth Camera
The Visual Internet of Things System Based on Depth Camera Xucong Zhang 1, Xiaoyun Wang and Yingmin Jia Abstract The Visual Internet of Things is an important part of information technology. It is proposed
More information